web analytics
  • Let Us Learn,  News and Threat Analysis,  Tools, Tricks and More

    CHARMING KITTEN ONCE AGAIN COMES INTO SPOTLIGHT, GIVING CHRISTMAS AND NEW YEAR GIFTS TO ITS VICTIMS

    Last year might be one of the worst year for all of us as coronavirus affected our life in  every aspect, but cybercriminals made this year special for themselves as they made big numbers in their history. The year was all filled with cyberattacks either it was  tourism industry or it was a cybersecurity company. There were huge leaks of databases by these criminals, there were privacy issues that come into notice, for some it was going absolutely wrong but still, for some it was going alright. When the year was coming to end, we all were excited for the new year, we all were looking for a new and…

  • News and Threat Analysis,  Tools, Tricks and More

    UNCONFIGURED REDIS DBMS EXPOSE THOUSANDS OF SERVERS TO MINING TROJANS

    HACKERS RUSH IN DEPLOYING MINERS AFTER SURGE IN BITCOIN MARKET VALUE Though banned in many countries, virtual and digital cryptocurrencies have caught many investors’ eyes in the last few days. There is no doubt on this fact that these currencies are not meant for short term profits but its long-term profits are much more valuable than investing in some future goal funds. Thus, for some who already know about it and have invested a lot by taking risks, this investment has turned out to be an ace of spades that has made huge profits for them. Cryptocurrencies are one of the major sources of anonymity by hackers. If we go…

  • News and Threat Analysis,  Tools, Tricks and More

    THIS CRYPTO MINING TROJAN HAS INFECTED MORE THAN 15000 SERVERS. IS YOUR NEXT?

    Experts have researched a Miner Trojan named TopMiner that uses the methodology of SSH blasting attacks- an attack which results due to weak passwords or vulnerable SSH accounts to get into the servers. After successfully attacking the vulnerable servers with the trojan, malware downloads the SSH blasting program and some other scripts to take-over the root account for the Linux systems with port 22 open available on the network.

  • News and Threat Analysis

    2020’S TOP 4 VULNERABILITIES WHICH ARE THE CAUSES BEHIND MAJOR CYBERATTACKS

    Every cyber geek know this fact that 2020 has been the most promising year for bad actors. The number of cyberattacks have increased drastically this year if we compare from any other year in the last decade or century. In cybersecurity industry, we all see the largest DDOS attacks ranging upto 809 million packets per second recorded by Akamai. Also there are lots of other cyberattacks which took place, some due to vulnerabilities in  systems, and some due to social engineering. There are lots of data dumps, breaches and security bypass in this outbreak. The cost of data breaches is one of the most significant factors why most organizations, corporates…

  • Let Us Learn,  News and Threat Analysis

    MUHSTIK BOTNET STRIKES AGAIN, EXPLOITING SERVERS WITH WEAK PASSWORDS

    In the 21st century, we all know the importance of privacy due to growth of digital era in all sectors. Either a person is educated or not, he/she knows the fact that they have to give utmost importance to their privacy. But the word privacy sometimes have double meaning. If we take the case of tech giants or organization, they are sometimes caught up tracking your personal data which they are not authorized to do so in the name of privacy, whereas on the other hand we all know hackers steal our data to exploit our privacy. As a privileged user, you can revoke the company or organization in first…